1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vanyuwa [196]
3 years ago
14

You view a portion of a document on the screen through a

Computers and Technology
1 answer:
Stells [14]3 years ago
6 0

Answer:

Document window is through which we view the portion of a document.

Explanation:

We have many portions like tabs, ruler, ribbon, etc in word. There is one another feature called Document Window in word where it represents the actual view of a document in GUI (Graphical User Interface) operating system.

Here the actual contents of the page are created and the user can also insert various shapes based on the need.  Any feature in the tabs can be included in the document window. You can set the zoom size of the document according to the need.

You might be interested in
Which type of input devices used in big hero 6 movie
Maslowich

The  Input Devices Used in Movie Big Hero are:

  • A joystick
  • medical robot
  • Armored exoskeleton
  • Jet-boots.

<h3>What are input device?</h3>

This is known to be a is a piece of instrument that helps gives or provide data to any information processing system.

Note that the Input Devices Used in Movie Big Hero “6”  are  a medical robot made by by Tadashi Hamada., Armored exoskeleton and others.

Learn more about input device from

brainly.com/question/24455519

#SPJ1

7 0
2 years ago
8.17 Lab: Strings of a Frequency Write a program that reads whitespace delimited strings (words) and an integer (freq). Then, th
gavmur [86]

Answer:

def occurencesOfWords(words,freq):

  frequency_dictionary={}

  matched_frequency_words=[]

  for i in range(len(words)):

      counter=1

      a=words[i].lower()

      for j in range(len(words)):

          if(i==j):

              continue

          b=words[j].lower()

          if(a==b):

              counter+=1

      frequency_dictionary[words[i]]=counter

  for key in frequency_dictionary:

      if(frequency_dictionary[key]==freq):

          matched_frequency_words.append(key)

  return matched_frequency_words

if __name__=='__main__':

  user_input=input()

  freq=int(input())

  words=user_input.split(" ");

  required_words=occurencesOfWords(words,freq)

  for s in required_words:

      print(s)

Explanation:

  • Inside the occurencesOfWords function, initialize a frequency_dictionary that is used to store the string and the frequency of that specific string .
  • matched_frequency_words is an array that is used to store each string whose frequency matches with the provided frequency
  • Run a nested for loop up to the length of words and inside the nested for loop, skip the iteration if both variables i and j are equal as both strings are at same index.
  • Increment the counter variable, if two string are equal.
  • Loop through the frequency_dictionary to get the matching frequency strings .
  • Finally test the program inside the main function.
5 0
3 years ago
An Administrator wants to have a thank you email sent after the form on the "Request a Demo" landing page is submitted. Where ca
sweet [91]

Answer:

Answer D is correct :

Explanation:

Configure an autoresponder email to send as a completion action when the \Request a Demo\ form has been submitted.

6 0
3 years ago
Which customers are typical for the Argriculture,Food, and Natural Resources career cluster?
Ahat [919]

Ecosystem developers

8 0
4 years ago
he IT director asks you to verify that the organization's virtualization technology is implemented securely. What should you do
Kamila [148]

Answer:

Check that virtual machines have always had the upcoming services packs as well as patches set up.

Explanation:

  • Among the very most essential preventive measures, you could even begin taking would be to download the application security relies on upon and splotches. The whole principle applies to routine OS, implementations as well as virtualization software.
  • It would not be appropriate for software applications to have been multihomed even though it will not seem to significantly boost their protection.
  • Penetration testing is being managed to complete before the implementation of virtual servers. Subnetting isn't necessary for virtual servers, and while it may improve safety. It must be factored into the equation during most of the capacity building phase.
7 0
3 years ago
Other questions:
  • When you ____ a method, you write multiple methods with a shared name but different parameter lists?
    10·1 answer
  • All spreadsheet formula should start with
    12·1 answer
  • Hich function would be used to remove a section of text from a document?
    12·1 answer
  • If a menu-driven program uses a loop to redisplay the menu after a selected operation has been performed, the menu should probab
    14·1 answer
  • Use the _______ command to center worksheets vertically and/or horizontally on a page.
    9·1 answer
  • The online underground is used _____. Select 3 options. by law-abiding citizens only on Black Friday for networking by criminal
    11·1 answer
  • What are some of the ways we can resolve IPv4 address shortages? Check all that apply.
    13·1 answer
  • Two character strings may have many common substrings. Substrings are required to be contiguous in the original string. For exam
    7·1 answer
  • It is used to show the program and files that are open.
    12·1 answer
  • Which of these sentences correctly shows how youngsters use the Internet?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!